100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CSIA 105 Final Exam Review Questions with Correct Answers

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
23-03-2024
Written in
2023/2024

CSIA 105 Final Exam Review Questions with Correct Answers

Institution
CSIA
Course
CSIA








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSIA
Course
CSIA

Document information

Uploaded on
March 23, 2024
Number of pages
2
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSIA 105 Final Exam Review Questions
with Correct Answers
The goal of what type of threat evaluation is to better understand who the attackers are,
why they attack, and what types of attacks might occur? - Answer-threat modeling

What is the name of the process that takes a snapshot of the current security of an
organization? - Answer-vulnerability appraisal

The comparison of the present state of a system to its baseline is known as what? -
Answer-Baseline reporting

In order to minimize vulnerabilities in software, code should be subject to and analyzed
while it is being written in what option below? - Answer-code review

What is the name for the code that can be executed by unauthorized users within a
software product? - Answer-attack surface

During a vulnerability assessment, what type of software can be used to search a
system for port vulnerabilities? - Answer-port scanner

A port in what state below implies that an application or service assigned to that port is
listening for any instructions? - Answer-open port

An administrator running a port scan wants to ensure that no processes are listening on
port 23. What state should the port be in? - Answer-closed port

An administrator needs to view packets and decode and analyze their contents. What
type of application should the administrator use? - Answer-protocol analyzer

Which is the term for a computer typically located in an area with limited security and
loaded with software and data files that appear to be authentic, yet they are actually
imitations of real data files. - Answer-honeypot

What is the term for a network set up with intentional vulnerabilities? - Answer-honeynet

What is another term used for a security weakness? - Answer-vulnerability

Which scan examines the current security, in a passive method? - Answer-vulnerability
scan

What is the end result of a penetration test? - Answer-penetration test report

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
biggdreamer Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
250
Member since
2 year
Number of followers
68
Documents
17967
Last sold
1 day ago

4.0

38 reviews

5
22
4
4
3
6
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions